lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <OFC841ED64.A7930463-ON88256FC6.005F08A5-88256FC6.005F3A23@notesmail.csulb.edu>
From: rsumida at csulb.edu (Ryan Sumida)
Subject: Wi-fi. Approaching customers

But wouldn't you need to know where the sensors are located?  If they are 
passive and never send out traffic how would you find them aside from 
social engineering?

Ryan

full-disclosure-bounces@...ts.grok.org.uk wrote on 03/16/2005 08:25:53 AM:

> 
> Just making a wild guess here, but - if I were going to implement
> something like this, I'd think to use a rough sort of triangulation.
> Put access points outside the building, but don't use them to grant
> network access, only to compare the signal strength of transmissions you
> pick up on the inside access points.
> 
> That might then open you up to someone with a carefully aimed
> directional antenna shooting their signal straight at one of your
> "inside" sensors, and letting the "outside" ones only see a very weak
> signal.  Still, just sitting in a park with a laptop should be
> detectable.
> 
> I guess you could only meaningfully compare signal strengths as seen at
> different points, as at light speed the delays wouldn't be measurable
> with any sort of accuracy.  (If you could measure the delays you'd be in
> great shape - that was used in WWI to pick out the location of gun
> batteries, just using two mics and very accurate timers.)
> 
> Purest speculation though - I've no idea how they do this.
> 
> Mark
> 
> 
> -----------
> on March 15, 2005 22:04 Ron DuFresne wrote:
> 
> On Wed, 16 Mar 2005, Gregh wrote:
> 
>    [HEADERS SNIPPED]
> 
> >
> >
> > >
> > >>From what little I read on their site, it seems to be a radius auth 
> > >>mech
> > > based upon MAC addresses.
> > >
> >
> > Isn't that basically what a lot of wi-fi broadband router/modems do
> anyway?
> >
> > Eg, set up a netgear DG834 (think it was) and it was having problems
> with auto assigned IPs for lan members so shortcut the problem by
> telling it to manually assign IP number to MAC so that each time a MAC
> came in range it got the same IP number always. I set the IP numbers
> manually at each client computer and thus they would only connect using
> that number. Connection problems died off instantly, then. The upshot is
> that if the MAC is unknown, it cant get access now even if the WEP is
> successfully decrypted. Wouldn't that radius auth be basically that
> idea?
> >
> 
> That's what I read, as well as a lot of talk about "location-enabled
> network or LENs", which the more reading I do give the impression they
> have some kind of GPS functionality invovled, this is the only way I can
> make any real sense of their claims to be able to segment the wLAN<s>
> into locations and determine a sense of perimiter limits and location
> sense.
> Of course, I'm trying to give the benefit of the doubt and read that
> they actually sell what they are claiming in marketing lit.
> 
> Thanks,
> 
> 
> Ron DuFresne
> --
> "Sometimes you get the blues because your baby leaves you. Sometimes you
> get'em 'cause she comes back." --B.B. King
>         ***testing, only testing, and damn good at it too!***
> 
> OK, so you're a Ph.D.  Just don't touch anything.
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://www.secunia.com/
> 
> This email and any files transmitted with it are confidential and 
> intended solely for the use of the individual or entity to whom they are
> addressed. If you have received this email in error please notify the 
> system manager. This message contains confidential information and is 
> intended only for the individual named. If you are not the named 
> addressee you should not disseminate, distribute or copy this e-mail.
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://www.secunia.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050316/bb55bd5c/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ